Browse Definitions :

Browse Definitions by Alphabet

BLU - BRO

  • blue screen of death (BSOD) - Officially called the stop screen, or stop error, the blue screen of death (BSOD) is a most unwanted error, second only to malware or ransomware in indicating that a user is in for a very bad day.
  • blue/green deployment - A blue/green deployment is a change management strategy for releasing software code.
  • BlueKeep (CVE-2019-0708) - BlueKeep (CVE-2019-0708) is a vulnerability in the Remote Desktop (RDP) protocol that affects Windows 7, Windows XP, Server 2003 and 2008.
  • bluesnarfing - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • Bluetooth - Bluetooth is a telecommunications industry specification that describes how mobile devices, computers and other devices can easily communicate with each other using a short-range wireless connection.
  • Bluetooth 2.0+EDR - Bluetooth 2.
  • Bluetooth 4.0 - Bluetooth 4.
  • Bluetooth brick - A Bluetooth brick is a battery-powered, sealed device that has sensors for monitoring and communicating information such as temperature or vibration levels.
  • Bluetooth Low Energy (Bluetooth LE) - Also marketed as Bluetooth Smart, Bluetooth LE was introduced in the Bluetooth 4.
  • BNC (Bayonet Neil-Concelman or British Naval Connector) - A BNC (Bayonet Neil-Concelman, or sometimes British Naval Connector) connector is used to connect a computer to a coaxial cable in a 10BASE-2 Ethernet network.
  • board support package - A board support package (BSP) is essential code code for a given computer hardware device that will make that device work with the computer's OS (operating system).
  • body area network (BAN) - A body area network (BAN) is the interconnection of multiple computing devices worn on, affixed to or implanted in a person’s body.
  • body cam (bodycam) - A body cam (bodycam) is an audio/video recording device that is clipped to one’s clothing, on the torso.
  • bodyshopping - Body shopping, sometimes spelled as one word (bodyshopping), is an IT-centric outsourcing / sub-contracting model.
  • bogomips - Bogomips is a measurement provided in the Linux operating system that indicates in a relative way how fast the computer processor runs.
  • bogon - A bogon is an illegitimate IP address that falls into a set of IP addresses that have not been officially assigned to an entity by an internet registration institute, such as the Internet Assigned Number Authority (IANA).
  • Bohr radius - The Bohr radius, symbolized as 0, is the mean radius of the orbit of an electron around the nucleus of a hydrogen atom at its ground state (lowest-energy level).
  • boil the ocean - To boil the ocean, in a business context, is to increase the scope of a project or task until it is practically impossible to accomplish as envisioned.
  • boilerplate - In information technology, a boilerplate is a unit of writing that can be reused over and over without change.
  • BOINC (Berkeley Open Infrastructure for Network Computing) - BOINC (Berkeley Open Infrastructure for Network Computing) is a distributed computing infrastructure based on a centralized server and volunteer computer resources.
  • Boltzmann's constant - Boltzmann's constant, also called the Boltzmann constant and symbolized k or k B, defines the relation between absolute temperature and the kinetic energy contained in each molecule of an ideal gas.
  • Bombay Stock Exchange - The Bombay Stock Exchange or BSE is Asia's oldest stock exchange.
  • bone conduction headphones - Bone conduction headphones -- sometimes called 'bonephones'-- are headphones that transmit sound waves through the bones in a user's skull instead of their ear canal.
  • BOO project (build, own, operate project) - BOO (build, own, operate) is a public-private partnership (PPP) project model in which a private organization builds, owns and operates some facility or structure with some degree of public involvement.
  • book of business - Book of business is another name for an account or client list.
  • booking engine - A booking engine is a software as a service (SaaS) application used by hospitality businesses to provides guests with the opportunity to reserve a property online.
  • bookmark - Using a World Wide Web browser, a bookmark is a saved link to a Web page that has been added to a list of saved links.
  • Boolean - The term "Boolean," often encountered when doing searches on the Web (and sometimes spelled "boolean"), refers to a system of logical thought developed by the English mathematician and computer pioneer, George Boole (1815-64).
  • Boolean operator - Boolean operators are a common type of search operator, sometimes referred to as a search parameters, which are characters or strings of characters – including words and phrases – that are used in a search engine query to narrow the focus of the search.
  • boot - To boot (as a verb; also "to boot up") a computer is to load an operating system into the computer's main memory or random access memory (RAM).
  • BOOT (build, own, operate and transfer) - BOOT (build, own, operate, transfer) is a project funding model based on a financial agreement between a private contractor and a public organization.
  • boot loader (boot manager) - A boot loader, also called a boot manager, is a small program that places the operating system (OS) of a computer into memory.
  • boot partition - A boot partition is a disk partition responsible for holding Windows system files when booting up Windows.
  • boot sector - A boot sector is a specially assigned section of a storage drive containing the files required to start the operating system (OS) and other bootable programs such as antivirus programs, drive partitioning software, backup tools and diagnostic disks.
  • boot sector virus - A boot sector virus is malware that infects the computer storage sector where startup files are found.
  • Boot2Docker - Boot2Docker is a minimalist Linux distribution with the sole purpose to run Docker containers.
  • BOOTP (Bootstrap Protocol) - BOOTP (Bootstrap Protocol) is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.
  • Bootstrap - Bootstrap is a free and open source front-end development framework for the creation of websites and web apps.
  • BOPIS (buy online, pick up in-store) - BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up their purchases in the brick-and-mortar store, often within the same day.
  • Boston Dynamics - Boston Dynamics is an American robotics research and development company, known for producing numerous robot designs and their ongoing testing in real-world environments and simulated tasks.
  • bot - A bot -- short for robot and also called an internet bot -- is a computer program that operates as an agent for a user or other program or to simulate a human activity.
  • bot herder - A bot herder is a hacker that seeks out vulnerable computers and infects them so that they can be controlled as a botnet.
  • bot worm - A bot worm is a self-replicating malware program that resides in current memory, turns infected computers into zombies (or bots) and transmits itself to other computers.
  • botnet - A botnet is a collection of internet-connected devices, which may include personal computers (PCs), servers, mobile devices and internet of things (IoT) devices, that are infected and controlled by a common type of malware, often unbeknownst to their owner.
  • botnet sinkhole - A botnet sinkhole is a target machine used by researchers to gather information about a particular botnet.
  • botnet topology - A botnet topology is the network structure by which botnet interconnections are organized.
  • Boto - Boto is a software development kit (SDK) designed to improve the use of the Python programming language in Amazon Web Services.
  • bottleneck - A bottleneck, in a communications context, is a point in the enterprise where the flow of data is impaired or stopped entirely.
  • bounce email (bounce mail) - Bounce e-mail (sometimes referred to as bounce mail) is electronic mail that is returned to the sender because it cannot be delivered for some reason.
  • Bourne shell - The Bourne shell is the original UNIX shell (command execution program, often called a command interpreter) that was developed at AT&T.
  • Box (Box.net) - Box is an online file-sharing, storage and collaboration service provider that caters to individual users as well as businesses.
  • box plot - A box plot is a graphical rendition of statistical data based on the minimum, first quartile, median, third quartile, and maximum.
  • BPaaS (Business Process as a Service) - Business Process as a Service (BPaaS) is a form of business process outsourcing (BPO) that employs a cloud computing service model.
  • BPEL (Business Process Execution Language) - BPEL (Business Process Execution Language) is an XML-based language that allows web services, APIs and human processes in a service-oriented architecture (SOA) to interconnect and share data in a business workflow.
  • brain dump - A brain dump (sometimes spelled braindump, or brain-dump) is a complete transfer of accessible knowledge about a particular subject from your brain to some other storage medium, such as paper or your computer's hard drive.
  • brain hacking - Brain hacking is the application of techniques and/or technologies to affect an individual’s mental state, cognitive processes or level of function.
  • brain hijacking - Brain hijacking is the application of principles from fields including neuroscience, behavioral psychology and sociology to develop compulsive elements for consumer technologies.
  • brain-computer interface (BCI) - Brain-computer interface (BCI) is a collaboration between a brain and a device that enables signals from the brain to direct some external activity, such as control of a cursor or a prosthetic limb.
  • brainjacking - Brainjacking is the hacking of neural implants, surgically implanted devices, which interface with the brain and the central nervous system.
  • brainstorming - Brainstorming is a group problem-solving method that involves the spontaneous contribution of creative ideas and solutions.
  • branching - Branching is the practice of creating copies of programs or objects in development to work in parallel versions, retaining the original and working on the branch or making different changes to each.
  • brand - A brand is a product, service, or concept that is publicly distinguished from other products, services, or concepts so that it can be easily communicated and usually marketed.
  • brand ambassador - A brand ambassador is an advocate of a particular company's products and services.
  • brand equity - Brand equity is the perceived value a company gains by having a known name, logo or other identifier.
  • brand essence (brand mantra) - Brand essence, also known as a brand mantra, is a short statement that expresses the core of what that brand represents or the image it seeks to project.
  • brand experience - Brand experience is a type of experiential marketing that incorporates a holistic set of conditions created by a company to influence the feeling a customer has about a particular product or company name.
  • brand journalism - Brand journalism is a mix of content marketing, public relations and corporate communications.
  • brand loyalty - Brand loyalty is an emotional tie to a brand that leads to a consumer to continue and expand their purchases for products from the same brand.
  • brand recognition - Brand recognition is the extent to which a consumer can correctly identify a particular product or service just by viewing the product or service's logo, tag line, packaging or advertising campaign.
  • brandjacking - Brandjacking is an act that allows an individual or company to assume or exploit a brand's identity to undermine that brand.
  • breach detection system (BDS) - Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred.
  • breadcrumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • break/fix - For IT services companies, break/fix is a method of providing IT support to customers.
  • BREW (Binary Runtime Environment for Wireless) - BREW (Binary Runtime Environment for Wireless) is Qualcomm's open source application development platform for wireless devices equipped for code division multiple access (CDMA) technology.
  • brick server - A brick server is a compact computer server module without a chassis that can come in various processor, RAM, I/O, and storage configurations and is designed to fit into rack locations similar to those for blade servers.
  • bridge - A bridge is a class of network device that’s designed to connect networks at OSI Level 2, which is the data link layer of a local-area network (LAN).
  • bridge tap - A bridge tap is an extraneous length of dangling, unterminated cable on a communications line, usually left over from an earlier configuration, that can cause impedance mismatches and other undesired effects in transmissions.
  • bright-line rule - A bright-line rule, also known as a bright-line test, is a directly-stated law or standard that is worded to avoid room for interpretation and also contains a break-down of objectives.
  • bring your own apps (BYOA) - Bring your own apps (BYOA) is the trend toward employee use of third-party applications and cloud services in the workplace.
  • bring your own bandwidth (BYOB) - Bring your own bandwidth (BYOB) is a voice communications service in which a business purchases the voice services only and uses their own internet connection from their existing internet service provider (ISP) to host the voice service.
  • bring your own cloud (BYOC) - BYOC is a movement whereby employees and departments use their cloud computing service of choice in the workplace.
  • bring your own everything (BYOx) - Bring your own everything (BYOx) is a term that refers to employees' use of personal technology to perform work tasks.
  • bring your own network (BYON) - When a network administrator talks about BYON, he is describing the ability that employees have to create a wireless hot spot at work.
  • British Standards Institution (BSI) - The British Standards Institution (BSI) is a service organization that produces standards across a wide variety of industry sectors.
  • British thermal unit (Btu) - A British thermal unit (Btu) is a standard unit of energy that is used in the United States and sometimes in the U.
  • broadband - In general, broadband refers to telecommunication in which a wide band of frequencies is available to transmit information.
  • Broadband Technology Opportunities Program (BTOP) - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • broadband voice gateway - A broadband voice gateway is a device that allows you to make telephone calls over a high-speed Internet connection rather than through a regular telephone outlet without having to go through your computer.
  • broadcast - In general, to broadcast (verb) is to cast or throw forth something in all directions at the same time.
  • brochureware - Brochureware refers to Web sites or pages that are produced by taking an organization's printed brochure and translating it directly to the Web without regard for the possibilities of the new medium.
  • brogrammer - A brogrammer is a male programmer with traits often associated with fraternity brothers (bros) rather than the coder's stereotypical geek persona.
  • broken window theory - Broken window theory is the concept that each problem that goes unattended in a given environment affects people's attitude toward that environment and leads to more problems.
  • broker - A broker is someone or something that acts as an intermediary third party, managing transactions between two other entities.
  • brontobyte - A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.
  • brownfield (brownfield deployment, brownfield site) - A brownfield deployment, in information technology, is the installation and configuration of new hardware or software that must coexist with legacy IT systems.
  • brownout reset - A brownout reset is a circuit that causes a computer processor to reset (or reboot) in the event of a brownout, which is a significant drop in the power supply output voltage.
  • browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.
  • browser extension - A browser extension is a small application that adds a capacity or functionality to a browser.
  • browser extension malware - Extension malware is any browser extension that was developed intentionally with coding that causes undesirable behaviors or whose code has been compromised by an attacker to do so.
  • browser hijacker (browser hijacking) - A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close